IDaaS Competition

IDaaS Competition

IDaaS competition is heating up. There is no doubt that the category is receiving a lot of attention, especially with multiple vendors being acquired and going public recently. Perhaps the most interesting part of this identity management market is how it is morphing and changing. With innovations in cloud technology and more, there have never been more solutions readily available. What IDaaS competition are we now seeing, and how has the market evolved into what it is today? Those questions will be answered within this blog post.

The IDaaS Space in the Beginning

The Identity-as-a-Service (IDaaS) space really kicked off as just a web application single sign-on category. At its inception, Microsoft® Active Directory® owned the entire IAM space largely because the vast majority of IT resources that needed to be controlled were just Microsoft Windows machines and applications.

But, as web applications started to explode into popularity – largely thanks to solutions such as Salesforce®, Google Apps, Box®, and others – there needed to be a way to securely connect users to these IT resources. Active Directory couldn’t connect to cloud resources on it’s own, and admins obviously couldn’t leave the identities unmanaged. They could set up a siloed directory, but most IT admins don’t want yet another place to manage identities. As a result, forward thinking vendors created the web app SSO category.

IDaaS and Identity Management

With the creation of this new category, there was a need for a name. Analysts jumped in and branded the category Identity-as-a-Service, or IDaaS, because many of these new vendors were delivering their solutions from the cloud. This was unfortunately a misnomer. Since these web app SSO platforms pull the identity from Active Directory, and don’t own the identity themselves, the term Identity-as-a-Service is a little off. Still, the name stuck, and the IDaaS market was born. This led to years of user identities being federated from AD to first generation IDaaS platforms, which ultimately fed the identities to the web applications.

For most IT organizations, this architecture of leveraging Active (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 169 posts and counting.See all posts by jon-griffin